Index: extensions/browser/extension_web_contents_observer.cc |
diff --git a/extensions/browser/extension_web_contents_observer.cc b/extensions/browser/extension_web_contents_observer.cc |
index fa3c92537fdea499a4838fab9a7e728b45958b28..370c08244031579411eae693bf8b03bf67ac2c7d 100644 |
--- a/extensions/browser/extension_web_contents_observer.cc |
+++ b/extensions/browser/extension_web_contents_observer.cc |
@@ -225,8 +225,8 @@ const Extension* ExtensionWebContentsObserver::GetExtensionFromFrame( |
const url::Origin& origin(render_frame_host->GetLastCommittedOrigin()); |
// Without site isolation, this check is needed to eliminate non-extension |
// schemes. With site isolation, this is still needed to exclude sandboxed |
- // extension frames with a unique origin. |
- if (origin.unique() || |
+ // extension frames with an opaque origin. |
+ if (origin.opaque() || |
site_url != content::SiteInstance::GetSiteForURL(browser_context, |
origin.GetURL())) |
return nullptr; |